Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Auto-scaled ISL tracking for region based control infrastructure and applications in video surveillance., , , and . Comput. Syst. Sci. Eng., (2011)Potent and Stealthy Control Flow Obfuscation by Stack Based Self-Modifying Code., and . IEEE Trans. Inf. Forensics Secur., 8 (4): 669-681 (2013)Pixel estimation based video forgery detection., and . ICASSP, page 3038-3042. IEEE, (2013)Online SVM and backward model validation based visual tracking., , and . ICIP, page 4327-4331. IEEE, (2017)Size-restricted cluster formation and cluster maintenance technique for mobile ad hoc networks., , and . Int. J. Netw. Manag., 17 (2): 171-194 (2007)Context based Watermarking of Secure JPEG-LS Images., and . SIGMAP, page 161-166. SciTePress, (2011)Pedestrian Tracking Based on Hidden-Latent Temporal Markov Chain., , and . MMM (2), volume 6524 of Lecture Notes in Computer Science, page 285-295. Springer, (2011)GSDroid: Graph Signal Based Compact Feature Representation for Android Malware Detection., , and . Expert Syst. Appl., (2020)Moving people tracking with detection by latent semantic analysis for visual surveillance applications., , , and . Multim. Tools Appl., 68 (3): 991-1021 (2014)Visual Object Tracking Based on Backward Model Validation., , , and . IEEE Trans. Circuits Syst. Video Technol., 24 (11): 1898-1910 (2014)